It is called as asymmetric encryption technique because it handles two keys in number for encryption and decryption process. It offers the services which are provided by the symmetric encryption but in addition to that it also offers digital signature and key distribution methodologies. Anyone having the public key can encrypt messages or verify signatures, but cannot decrypt messages or create signatures. But the one who is having the private key can decrypt and create the signatures. It is also said to be asymmetric because those who encrypt the message and create the signature cannot decrypt and verifies the signature.

Characteristics of public key cryptography:

It is computationally infeasible to find the decryption key when knowing the encryption algorithm and the decryption key.

It is also computationally feasible to find the encrypted/decrypted messages when the relevant encrypted/decrypted key is known.

It uses either of the two keys for encryption and other for decryption process.

Block representation of public key cryptography:

The above picture represents the encryption using public key.

The above picture represents the encryption using public key.

So what is the difference between symmetric and asymmetric encryption:

SYMMETRIC ENCRYPTION

ASYMMETRIC ENCRYPTION

It uses same key for the encryption and decryption and with the same algorithm

It uses different keys for encryption and decryption and with the same algorithm

The sender and the receiver must share the key and the algorithm.

The sender and receiver must have one among the two keys with them but not the same.

The key must be kept secret

One of the two keys must be kept secret

Public key cryptography provides authentication and secrecy.

Depending on the application, the sender makes the usage of sender’s private key or receivers public key or both for the better performance of some of the cryptographic functions.

In this mechanism the encryption always starts with the receiver and. The receiver generates two pair of keys one is public another is private. Public is shared with the sender and the encryption is done. The receiver uses his private key to decrypt the message.

Public key cryptographic applications:

Digital signatures.

Key exchange

Digital signatures:

This is one of the most prominent applications of the public key cryptography. In this the sender signs the message with its private key; it may applicable to the whole, message or to some certain block of the message.

Key exchange:

The server and the client co-operates for exchanging the session keys over the communication channel.

Security services offered by the digital signatures:

Authentication:

The public key mechanism provides authentication in a way that the signature is signed by the individual’s private key. So that recipient was confident enough that sender was the one to apply the signature.

Non-repudiation:

The public key cryptography mechanism provides non-repudiation service in a way that the individual cannot blame others by saying it was not his signature because he was the only person who was given access to the private key.

Integrity:

When the signature is verified at the senders end, it checks for the content in the message and maintains the time stamp of the signature, the slight change in the document makes the process check to fail.

Examples where protocols using public key cryptography techniques:

SSH

Bitcoin

Internet key change

Secure socket layer

Transport layer security

VoIP protocol

Algorithms which uses public key mechanism:

RSA

ELLIPTICAL CURVE CRYPTOGRAPHY

RSA:

It is one of the algorithm which follows asymmetric encryption methodology. The main theme of this encryption algorithm is using the method of prime factorization. Prime factorization involves finding the factors of the large composite prime number. This uses of the product of two prime numbers, which in turn makes the cryptanalyst in a problem of finding the actual numbers. In this each user generates a pair of public/private keys.

Working of RSA:

Step1:

Select two prime numbers, say P,Q and P≠Q.

Step2:

Calculating the system modules,

n=PXQ

[Symbol](n)= (P-1) (Q-1)

Step3:

Select the random number which is said to be the encryption key. Say e

1<e< [Symbol](n) and gcd ([Symbol](n), e) =1

Step4:

Find the decryption key d.

e.d[Symbol] 1mod [Symbol](n)

Step5:

Publish the public key for encryption

PU= {e, n}

Step5:

Keep the secret private key for decryption

PR= {d, p, q}

Encryption: C= Me mod n

Decryption: M= Cd mod n

Say p=3,Q=11;e=7;r=5

first we have to find n

n=P*Q=3*11=33

(n)=(P-1)(Q-1)=2*10=20

given e=7;

gcd((n)e)=1

check weather condition is satisfyinf for e on not

finding the d cryption key d.

e.dimod(n)

7*dimod20

d=3

public key={7,33}

private key={3,3,11}

ENCRYPTION:

C=Me mod n

C=57 mod 33

=78125 mod 33

=14

DECRYPTION:

C=Cd mod n

C=143 mod 33

=2744 mod 33

=5

M should be < N

RSA security:

The ways in which attacking can be possible in RSA

Brute force attack

Mathematical attack

Timing attack.

ELLYPTICAL CURVE CRYPTOGRAPHY:

ECC is also an algorithm based on the asymmetric encryption. It is used to create faster, smaller and efficient keys. It follows elliptical equation to generate the keys unlike the traditional method of prime numbers. It can also be combined with the RSA and diffie-hellman key exchange.

The general notation is Y3=x3+ax+b

Combination of ECC with elgamal:

Key exchange algorithm:

Diffie-hellman

Diffie-hellman:
it is the key exchange algorithm where the cryptographic key is exchanged over the public class. It is not used for any encryption or decryption of the messages.

Working:

Step1:

Select prime number q,

An integer α that is primitive root of q.

Step2:

User A selects the random integer XA<q. and computes

YA= αXA mod q

Step3:

User B selects the random integer XB<q. and computes.

XB= αXB mod q

Step4:

Both sides keeps the X as secret key and Y as public key, user A computes secret key as

K= YB XA mod q.

User B computes secret key as

K=YA XB md q

Primitive root:

Primitive root of a prime number n is an integer r between [1,n-1] such that values of rx mod n where x is in range of [0,n-2] are different.

Example:

N=7,

10 mod 7=1

11 mod 7=1

12 mod 7=1

13 mod 7=1

14 mod 7=1

15 mod 7=1

Value are repeated, go for r=2,

20 mod 7=1

21 mod 7=2

22 mod 7=4

23 mod 7=1

24 mod 7=2

25 mod 7=4

Values are repeated, go for r=3,

30 mod 7=1

31 mod 7=3

32 mod 7=2

33 mod 7=6

34 mod 7=4

35 mod 7=5

Values are not repeated so primitive values for 7 are 3.

Example of diffie-hellman:

q=23; = 9

sender and receiver computes public value.

YA=94 mod 23 = 6561 mod 23 = 6

YB=93mod 23 = 729 mod 23 = 16

sender and receiver excange public keys.

KA=(YB)XA mod q = 164 mod 23 = 9

KB=(YB)XB mod q = 63 mod 23 = 9

KA=KB ; sender and receiver can talk security

Elgamal cryptographic system:

It is same as diffie-hellman key exchange but also provides the encryption and decryption mechanism. It is also a asymmetric encryption which also provides add-ons when compared with the diffie-hellaman key exchange.

Working:

Step1:

Select prime number q,

An integer α that is primitive root of q.

Step2:

User A selects the random integer XA<q. and computes

YA= αXA mod q

Step3:

Key distribution.

Private Key: {XA}

Public key: {q, , XA}

Step4:

Encryption:

M<q; K<q

K= YA k mod q

C1= αK mod q

C2= K*M mod q

Step5:

Decryption:

K= c1 XA mod q

M= c2*k-1 mod q

Example:

q=71; = 7; k=2; M=30; YB=3

According to the above given q values

we have to selet XA

1<XA<q-1

XA=2

YA=YAmod q

=(7)2mod q

=49

private key={49}

public key={71,7,49}

given k=2

K=(49)2mod 71

=2401mod 71

=58

C1=K mod q

C1=(7)2mod 71=49

C1= KM mod 71=36

MAN IN THE MIDDLE ATTACK:

Most prominent attack possible in public key cryptography and the diffie-hellman key exchange is MAN IN THE MIDDLE attack.